SlideShare a Scribd company logo
Digital Identities in the Internet of Things
Securely Manage Devices at Scale
DATE: Tuesday, September 25, 2018
TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
www.kuppingercole.com
Martin Kuppinger
CEO, Founder & Principal Analyst
KuppingerCole
mk@kuppingercole.com
This webinar is supported by
Gerhard Zehethofer
VP Manufacturing
ForgeRock
• Founded in 2004
• International independent analyst organization
• Offers neutral advice, expertise, thought leadership, and
practical relevance
• Supports companies, corporate users, integrators, and
software manufacturers with tactical and strategic
challenges
• Specialized in:
• Information Security
• Identity & Access Management (IAM)
• Governance (IAG)
• Risk Management & Compliance (GRC)
• All areas concerning the Digital Transformation
About KuppingerCole
2© KuppingerCole
3
Our Business Areas
• Research on all major &
current topics tailored to
your needs
• Vendor-Neutral
• Always current
• Independent Advice
• Conferences, Webinars &
Special Events
• Innovative Leadership
• Future proof approach
• Great Networking
Opportunities
• Meet the Experts
• Best in class and trusted
Advisory Partner
• Together we make Your
Business more successful
• Most current advise in the
Era of Digital
Transformation
Research Events Advisory
© KuppingerCole
Upcoming KuppingerCole Events
4
More information at www.kuppingercole.com© KuppingerCole
5
You are muted centrally. You don‘t have to mute/unmute yourself – we control the
mute/unmute features
The Questions and Answers Session will be at the end. You can enter questions anytime, using
the Questions feature in the GoToWebinar Control Panel.
We will record the Webinar – the podcast recording will be available tomorrow.
© KuppingerCole
Some Guidelines for the Webinar
© KuppingerCole 6
Talks about the “why” and the “how” of Identities for IoT, both
Industrial IoT and Consumer IoT
How ForgeRock is extending IAM capabilities into the areas of
managed and unmanaged devices, enhancing the customer
experience as well as security and privacy at scale for people,
services, and things
Part 1
Martin Kuppinger
KuppingerCole
Part 2
Gerhard Zehethofer
ForgeRock
Questions and Answers (Q & A)Part 3
Agenda
1. The Digital Transformation affects every organization
2. The Digital Transformation is here to stay
3. Digital Transformation is more than just IoT
4. Digital Transformation mandates Organizational Change
5. Everything & Everyone becomes connected
6. Security & Safety: not a dichotomy
7. Security is a risk – and an opportunity
8. Identity is the glue – who or what may get access to what?
Eight Fundamentals for the Digital Transformation
© KuppingerCole 8
Smart watches
Connected
vehicles
Smart homes
Smart grids eBooks Digital music
Online retail Online payment Manufacturing
Fundamental #1
The Digital Transformation affects every organization
© KuppingerCole 9
Fundamental
#3.1
Digital Transformation is already reality in many industries – without any
connected things
Fundamental
#3.2
Industry 4.0 (or „smart manufacturing“) is about connecting manufacturing
environments and this „Operational Technology“ (OT) – quite big things here
Fundamental
#3.3
Connecting things for the sake of connectivity does not create business – it is
the change in business models and the services that make the business
Fundamental
#3.4
Most (not all) business providing things will earn more with services than
with the things
Fundamental #3
Digital Transformation is more than just IoT
© KuppingerCole 10
© KuppingerCole 11
Fundamental #5
Everything & Everyone becomes connected
The new ABC: Agile Business - Connected
© KuppingerCole
The quintessence of Industry 4.0:
Connecting everything = everything is under attack
Business Process
Established Attack Vectors
Manufacturing Process
Established, but yet rare Attack Vectors
Connecting Processes (Industry 4.0)
12
© KuppingerCole 13
Fundamental #6
Security & Safety: Not a dichotomy
Operational
Technology Security
•Safety (of humans and
equipment)
•Reliability
•Availability (of
technology)
Information
Technology Security
•Confidentiality
•Integrity
•Availability (of
information)
People use devices access services control manufacturing
Brave new world of smart manufacturing
In most scenarios, there will be bi-directional communication
A system an attacker can connect to is at risk
We have to merge OT and IT security (and „things“ security)
It‘s not about safety vs. security, it is about safety and security
Rethink OT: Time for SDOT – software-defined OT
Fundamental #1: More than humans - It’s also about Identities of things, devices, services, and apps
Fundamental #2: Multiple Identity Providers - We will not manage all identities internally anymore and trust will
vary
Fundamental #3: Multiple Attribute Providers - There will no longer be a single source of truth and information
on identities anymore
Fundamental #4: Multiple Identities - Many users will use different identities (or personas) and flexibly switch
between these
Fundamental #5: Multiple Authenticators - There is no single authenticator that works for all
Fundamental #6: Identity Relationships - We must map humans to things, devices, and apps
Fundamental #7: Context - Identity and Access Risk varies in context
Fundamental #8
Identity is the glue – access control is what you need
© KuppingerCole 14
Seven
Fundamentals
for Future
Identity and
Access
Management
Safety
•Ensure that
neither faults
nor failure nor
attacks cause
damage – revert
to fail-safe mode
and continue
working
Security
•Ensure that no
one can attack
the connected
thing(s) or set of
things
Privacy
•Ensure
compliance with
regulations and
avoid leakage of
PII
Identity
•Manage all
identities of
organizations,
people, device,
and things, and
their access to
systems,
components,
and data
© KuppingerCole 15
Four of the many challenges of security for IoT
© KuppingerCole 16
It‘s not only one big thing – IoT can be complex
…
…
…
…
… …
…
Sensors
Controllers
Systems
Entities
Identities
• Not all components are directly
addressable, i.e. sensors
• Controllers might work
unidirectional or bidirectional
• There is system-system and system-
peripheral system communication
• Various entities might access
systems that read or write to
controllers
• Multiple entities might access these
systems
Systems
Event data
recorder
Motor engine
controller
SCADA device
…
DataUsage data
Event data
Individual
configuration
data
State data
… Organizations
Manufacturer
Distributor
Insurance
company
Government
…
Individuals
Employees of
organizations
Workers
Auditors
Production
worker…
Events
Standard use
Violation of
defined limits
Accident
Technical
failure
…
© KuppingerCole 17
Understand the complexity of access
Who is allowed to access which data under which event?
Who is allowed to access which data under which event?
Multiple IAM systems, e.g. employees, customers, partners, suppliers, governmental
organizations, insurance companies,…
Data exchange to various types of partners such as manufacturer/reseller,
manufacturer/insurance companies, manufacturer/governmental organizations,…
Data is distributed across multiple controllers and systems
Systems in general are best suited for IAM for the IoT
There is a need for more than one IAM, because systems are massively segregated
(consumer vs. technical control)
Security and privacy for data that is shared/exchanged between multiple parties is hard to
enforce
© KuppingerCole 18
The IAM challenge of IIoT in complex environments
© KuppingerCole 19
Talks about the “why” and the “how” of Identities for IoT, both
Industrial IoT and Consumer IoT
How ForgeRock is extending IAM capabilities into the areas of
managed and unmanaged devices, enhancing the customer
experience as well as security and privacy at scale for people,
services, and things
Part 1
Martin Kuppinger
KuppingerCole
Part 2
Gerhard Zehethofer
ForgeRock
Questions and Answers (Q & A)Part 3
Agenda
Upcoming KuppingerCole Events
20
More information at www.kuppingercole.com© KuppingerCole
KuppingerCole GDPR Readiness Assessment
21
© KuppingerCole
22
KuppingerCole Core Advisory Areas
•A clear understanding of the scope and maturity of defined
processes, the implemented systems and the organization.
Benchmarking and Optimization
•A well thought-out strategy provides clear answers to future
questions and thus helps to significantly shorten decision-making
processes.
Strategy Support
•A concise and consistent vision in the development of IT
architectures and the selection of technologies, vendors and
products.
Architecture and Technology Support
•Support in the evaluation and management of implementation
projects over time. (One-time or scheduled).
Project Guidance
KuppingerCole
Advisory
Services
Benchmarking
and
Optimization
Strategy
Support
Architecture
and
Technology
Support
Project
Guidance
© KuppingerCole
Related Research
© KuppingerCole 23
No. Type Title L.
40296 Executive View ForgeRock Identity Platform
71316 Executive View ForgeRock Access Management
70282 Advisory Note Identity in IoT
70999 Advisory Note Connected Enterprise Step-by-step
70998 Advisory Note The new ABC for IT: Agile Businesses, Connected
73000 Whitepaper ForgeRock: The Effect of GDPR on Customer Relations
KuppingerCole Analysts AG
Headquarters
Wilhelmstr. 20-22
65185 Wiesbaden | Germany
Tel +49 (211) 23 70 77 – 0
Fax +49 (211) 23 70 77 – 11
www.kuppingercole.com
The Future of Information Security – Today.
info@kuppingercole.com
KC2016/10/05
© KuppingerCole

More Related Content

PDF
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
PDF
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
PPT
ForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
PPTX
Identity Live Sydney 2017 - Daniel Raskin
PDF
Implications of GDPR in Conjunction with UMA
PDF
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
PDF
Intelligent Authentication (Identity Live Berlin 2018)
PPTX
Identity Live London 2017 | Kenneth May
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
ForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
Identity Live Sydney 2017 - Daniel Raskin
Implications of GDPR in Conjunction with UMA
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
Intelligent Authentication (Identity Live Berlin 2018)
Identity Live London 2017 | Kenneth May

What's hot (20)

PDF
Identity Live Sydney: Building Trust and Privacy in a Connected Society
PPTX
2015 Identity Summit - CTO Innovation Center
PDF
Shift from GDPR readiness to sustained compliance to improve your business an...
PDF
Identity Live Sydney: Intelligent Authentication
PPTX
Identity Live Sydney 2017 - Tim Sheedy
PPTX
Identity Live Paris 2017 | Ian Sorbello, HSBC
PPTX
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
PPTX
Securing Access to SaaS Apps with WSO2 Identity Server
PDF
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
PPTX
2015 Identity Summit - Stepping Up to New Data Protection Challenges
PDF
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
PPTX
Identity Live Sydney 2017 - Ian Sorbello
PPTX
HSBC - ForgeRock Identity Summit 2017 Dusseldorf
PDF
Identity Live Singapore: Transform Your Cybersecurity Capability
PPTX
McKesson Case Study: Pharmacy Systems & Automation
PPTX
9.35am robert humphrey
PPTX
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
PDF
Winning with GDPR: How to Win Customer Loyalty and Trust
PDF
Go Beyond PSD2 Compliance with Digital Identity
PDF
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
Identity Live Sydney: Building Trust and Privacy in a Connected Society
2015 Identity Summit - CTO Innovation Center
Shift from GDPR readiness to sustained compliance to improve your business an...
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney 2017 - Tim Sheedy
Identity Live Paris 2017 | Ian Sorbello, HSBC
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Securing Access to SaaS Apps with WSO2 Identity Server
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
2015 Identity Summit - Stepping Up to New Data Protection Challenges
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Identity Live Sydney 2017 - Ian Sorbello
HSBC - ForgeRock Identity Summit 2017 Dusseldorf
Identity Live Singapore: Transform Your Cybersecurity Capability
McKesson Case Study: Pharmacy Systems & Automation
9.35am robert humphrey
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
Winning with GDPR: How to Win Customer Loyalty and Trust
Go Beyond PSD2 Compliance with Digital Identity
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
Ad

Similar to Digital Identities in the Internet of Things - Securely Manage Devices at Scale (20)

PDF
No IoT Without Identity
PPTX
Ben goodman cybersecurity in the iiot
PDF
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
PDF
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
PDF
The Internet of Things: the 4 security dimensions of smart devices
PDF
Trends in IRM: Internet of Things
PDF
Fernando Meco, Director de Marketing de SAS.
PPTX
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
PDF
RISE OF THE MACHINES: IRM IN AN IOT WORLD
PDF
Intel and the Internet of Things
PDF
How Secure are you Around “IoT”_.pdf
PDF
The Future of Digital Identity in the Age of the Internet of Things
PPTX
ForgeRock Gartner 2016 Security & Risk Management Summit
PPTX
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
PPTX
ForgeRock CTO TECHNOLOGY PREVIEW
PDF
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
PDF
Cybersecurity in the Age of IoT - Skillmine
PPTX
Ravi i ot-security
PPTX
Identity Live Paris 2017 | Mike Ellis
PDF
IoT identity management: a comprehensive guide to creating secure IoT device ...
No IoT Without Identity
Ben goodman cybersecurity in the iiot
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Internet of Things: the 4 security dimensions of smart devices
Trends in IRM: Internet of Things
Fernando Meco, Director de Marketing de SAS.
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
RISE OF THE MACHINES: IRM IN AN IOT WORLD
Intel and the Internet of Things
How Secure are you Around “IoT”_.pdf
The Future of Digital Identity in the Age of the Internet of Things
ForgeRock Gartner 2016 Security & Risk Management Summit
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
ForgeRock CTO TECHNOLOGY PREVIEW
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
Cybersecurity in the Age of IoT - Skillmine
Ravi i ot-security
Identity Live Paris 2017 | Mike Ellis
IoT identity management: a comprehensive guide to creating secure IoT device ...
Ad

More from ForgeRock (19)

PPTX
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
PDF
Identity Live Sydney: Identity Management - A Strategic Opportunity
PDF
Identity Live Singapore 2018 Keynote Presentation
PDF
Identity Live Sydney 2018 Keynote Presentation
PDF
Identity Live Singapore: Just Ask 'Em
PDF
Identity Live Singapore: Building Trust & Privacy in a Connected Society
PDF
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
PPTX
Get the Exact Identity Solution You Need - In the Cloud - Overview
PDF
Opening Keynote (Identity Live Berlin 2018)
PDF
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
PDF
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
PDF
Customer Safeguarding, Fraud and GDPR: Manah Khalil
PDF
Applying Innovative Tools for GDPR Success
PDF
What the Internet of Things Means for Consumer Privacy: Veronica Lara
PDF
Identity Live in Austin Keynote
PDF
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
PPTX
The Road to Intelligent Authentication Journeys
PPT
Identity Live Paris 2017 | Jean-François Dupitier & Christophe Lemaire, Pôle ...
PPTX
Identity Live Paris 2017 | Monetising Digital Customer Relationships
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Singapore 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution You Need - In the Cloud - Overview
Opening Keynote (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Customer Safeguarding, Fraud and GDPR: Manah Khalil
Applying Innovative Tools for GDPR Success
What the Internet of Things Means for Consumer Privacy: Veronica Lara
Identity Live in Austin Keynote
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
The Road to Intelligent Authentication Journeys
Identity Live Paris 2017 | Jean-François Dupitier & Christophe Lemaire, Pôle ...
Identity Live Paris 2017 | Monetising Digital Customer Relationships

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPT
Teaching material agriculture food technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Big Data Technologies - Introduction.pptx
PDF
Modernizing your data center with Dell and AMD
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation_ Review paper, used for researhc scholars
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Understanding_Digital_Forensics_Presentation.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Teaching material agriculture food technology
Spectral efficient network and resource selection model in 5G networks
Network Security Unit 5.pdf for BCA BBA.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
Advanced methodologies resolving dimensionality complications for autism neur...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Big Data Technologies - Introduction.pptx
Modernizing your data center with Dell and AMD

Digital Identities in the Internet of Things - Securely Manage Devices at Scale

  • 1. Digital Identities in the Internet of Things Securely Manage Devices at Scale DATE: Tuesday, September 25, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT www.kuppingercole.com Martin Kuppinger CEO, Founder & Principal Analyst KuppingerCole mk@kuppingercole.com This webinar is supported by Gerhard Zehethofer VP Manufacturing ForgeRock
  • 2. • Founded in 2004 • International independent analyst organization • Offers neutral advice, expertise, thought leadership, and practical relevance • Supports companies, corporate users, integrators, and software manufacturers with tactical and strategic challenges • Specialized in: • Information Security • Identity & Access Management (IAM) • Governance (IAG) • Risk Management & Compliance (GRC) • All areas concerning the Digital Transformation About KuppingerCole 2© KuppingerCole
  • 3. 3 Our Business Areas • Research on all major & current topics tailored to your needs • Vendor-Neutral • Always current • Independent Advice • Conferences, Webinars & Special Events • Innovative Leadership • Future proof approach • Great Networking Opportunities • Meet the Experts • Best in class and trusted Advisory Partner • Together we make Your Business more successful • Most current advise in the Era of Digital Transformation Research Events Advisory © KuppingerCole
  • 4. Upcoming KuppingerCole Events 4 More information at www.kuppingercole.com© KuppingerCole
  • 5. 5 You are muted centrally. You don‘t have to mute/unmute yourself – we control the mute/unmute features The Questions and Answers Session will be at the end. You can enter questions anytime, using the Questions feature in the GoToWebinar Control Panel. We will record the Webinar – the podcast recording will be available tomorrow. © KuppingerCole Some Guidelines for the Webinar
  • 6. © KuppingerCole 6 Talks about the “why” and the “how” of Identities for IoT, both Industrial IoT and Consumer IoT How ForgeRock is extending IAM capabilities into the areas of managed and unmanaged devices, enhancing the customer experience as well as security and privacy at scale for people, services, and things Part 1 Martin Kuppinger KuppingerCole Part 2 Gerhard Zehethofer ForgeRock Questions and Answers (Q & A)Part 3 Agenda
  • 7. 1. The Digital Transformation affects every organization 2. The Digital Transformation is here to stay 3. Digital Transformation is more than just IoT 4. Digital Transformation mandates Organizational Change 5. Everything & Everyone becomes connected 6. Security & Safety: not a dichotomy 7. Security is a risk – and an opportunity 8. Identity is the glue – who or what may get access to what? Eight Fundamentals for the Digital Transformation © KuppingerCole 8
  • 8. Smart watches Connected vehicles Smart homes Smart grids eBooks Digital music Online retail Online payment Manufacturing Fundamental #1 The Digital Transformation affects every organization © KuppingerCole 9
  • 9. Fundamental #3.1 Digital Transformation is already reality in many industries – without any connected things Fundamental #3.2 Industry 4.0 (or „smart manufacturing“) is about connecting manufacturing environments and this „Operational Technology“ (OT) – quite big things here Fundamental #3.3 Connecting things for the sake of connectivity does not create business – it is the change in business models and the services that make the business Fundamental #3.4 Most (not all) business providing things will earn more with services than with the things Fundamental #3 Digital Transformation is more than just IoT © KuppingerCole 10
  • 10. © KuppingerCole 11 Fundamental #5 Everything & Everyone becomes connected The new ABC: Agile Business - Connected
  • 11. © KuppingerCole The quintessence of Industry 4.0: Connecting everything = everything is under attack Business Process Established Attack Vectors Manufacturing Process Established, but yet rare Attack Vectors Connecting Processes (Industry 4.0) 12
  • 12. © KuppingerCole 13 Fundamental #6 Security & Safety: Not a dichotomy Operational Technology Security •Safety (of humans and equipment) •Reliability •Availability (of technology) Information Technology Security •Confidentiality •Integrity •Availability (of information) People use devices access services control manufacturing Brave new world of smart manufacturing In most scenarios, there will be bi-directional communication A system an attacker can connect to is at risk We have to merge OT and IT security (and „things“ security) It‘s not about safety vs. security, it is about safety and security Rethink OT: Time for SDOT – software-defined OT
  • 13. Fundamental #1: More than humans - It’s also about Identities of things, devices, services, and apps Fundamental #2: Multiple Identity Providers - We will not manage all identities internally anymore and trust will vary Fundamental #3: Multiple Attribute Providers - There will no longer be a single source of truth and information on identities anymore Fundamental #4: Multiple Identities - Many users will use different identities (or personas) and flexibly switch between these Fundamental #5: Multiple Authenticators - There is no single authenticator that works for all Fundamental #6: Identity Relationships - We must map humans to things, devices, and apps Fundamental #7: Context - Identity and Access Risk varies in context Fundamental #8 Identity is the glue – access control is what you need © KuppingerCole 14 Seven Fundamentals for Future Identity and Access Management
  • 14. Safety •Ensure that neither faults nor failure nor attacks cause damage – revert to fail-safe mode and continue working Security •Ensure that no one can attack the connected thing(s) or set of things Privacy •Ensure compliance with regulations and avoid leakage of PII Identity •Manage all identities of organizations, people, device, and things, and their access to systems, components, and data © KuppingerCole 15 Four of the many challenges of security for IoT
  • 15. © KuppingerCole 16 It‘s not only one big thing – IoT can be complex … … … … … … … Sensors Controllers Systems Entities Identities • Not all components are directly addressable, i.e. sensors • Controllers might work unidirectional or bidirectional • There is system-system and system- peripheral system communication • Various entities might access systems that read or write to controllers • Multiple entities might access these systems
  • 16. Systems Event data recorder Motor engine controller SCADA device … DataUsage data Event data Individual configuration data State data … Organizations Manufacturer Distributor Insurance company Government … Individuals Employees of organizations Workers Auditors Production worker… Events Standard use Violation of defined limits Accident Technical failure … © KuppingerCole 17 Understand the complexity of access Who is allowed to access which data under which event?
  • 17. Who is allowed to access which data under which event? Multiple IAM systems, e.g. employees, customers, partners, suppliers, governmental organizations, insurance companies,… Data exchange to various types of partners such as manufacturer/reseller, manufacturer/insurance companies, manufacturer/governmental organizations,… Data is distributed across multiple controllers and systems Systems in general are best suited for IAM for the IoT There is a need for more than one IAM, because systems are massively segregated (consumer vs. technical control) Security and privacy for data that is shared/exchanged between multiple parties is hard to enforce © KuppingerCole 18 The IAM challenge of IIoT in complex environments
  • 18. © KuppingerCole 19 Talks about the “why” and the “how” of Identities for IoT, both Industrial IoT and Consumer IoT How ForgeRock is extending IAM capabilities into the areas of managed and unmanaged devices, enhancing the customer experience as well as security and privacy at scale for people, services, and things Part 1 Martin Kuppinger KuppingerCole Part 2 Gerhard Zehethofer ForgeRock Questions and Answers (Q & A)Part 3 Agenda
  • 19. Upcoming KuppingerCole Events 20 More information at www.kuppingercole.com© KuppingerCole
  • 20. KuppingerCole GDPR Readiness Assessment 21 © KuppingerCole
  • 21. 22 KuppingerCole Core Advisory Areas •A clear understanding of the scope and maturity of defined processes, the implemented systems and the organization. Benchmarking and Optimization •A well thought-out strategy provides clear answers to future questions and thus helps to significantly shorten decision-making processes. Strategy Support •A concise and consistent vision in the development of IT architectures and the selection of technologies, vendors and products. Architecture and Technology Support •Support in the evaluation and management of implementation projects over time. (One-time or scheduled). Project Guidance KuppingerCole Advisory Services Benchmarking and Optimization Strategy Support Architecture and Technology Support Project Guidance © KuppingerCole
  • 22. Related Research © KuppingerCole 23 No. Type Title L. 40296 Executive View ForgeRock Identity Platform 71316 Executive View ForgeRock Access Management 70282 Advisory Note Identity in IoT 70999 Advisory Note Connected Enterprise Step-by-step 70998 Advisory Note The new ABC for IT: Agile Businesses, Connected 73000 Whitepaper ForgeRock: The Effect of GDPR on Customer Relations
  • 23. KuppingerCole Analysts AG Headquarters Wilhelmstr. 20-22 65185 Wiesbaden | Germany Tel +49 (211) 23 70 77 – 0 Fax +49 (211) 23 70 77 – 11 www.kuppingercole.com The Future of Information Security – Today. info@kuppingercole.com KC2016/10/05 © KuppingerCole